721 research outputs found

    Efficient Authenticated Encryption Schemes with Public Verifiability

    Full text link
    An authenticated encryption scheme allows messages to be encrypted and authenticated simultaneously. In 2003, Ma and Chen proposed such a scheme with public verifiability. That is, in their scheme the receiver can efficiently prove to a third party that a message is indeed originated from a specific sender. In this paper, we first identify two security weaknesses in the Ma-Chen authenticated encryption scheme. Then, based on the Schnorr signature, we proposed an efficient and secure improved scheme such that all the desired security requirements are satisfied.Comment: Early version appears in the Proc. of The 60th IEEE Vehicular Technology Conference (VTC 2004-Fall) - Wireless Technologies for Global Security. IEEE, 200

    Simulation of cargo VOC emissions from petroleum tankers in transit in Canadian waters

    Get PDF
    The emissions of volatile organic compounds (VOCs) from petroleum product tankers potentially represent a significant source of VOCs in port cities. Emission factors are used to estimate the produced VOCs. VOC emissions from transit operations were simulated using a two part model of heat and mass transfer. Using local meteorological data of air temperatures, solar radiation and wind speed, the heat transfer within the tank was modeled. Results showed that bulk cargo temperature remained relatively steady at 25–28°C, the oil surface oscillated diurnally by 1–2°C, and the deck temperature oscillates diurnally by 15–20°C. The solar insolation had the largest effect on the tank temperatures. VOC emissions for two crude oils and gasoline, two tank configurations, and two meteorological conditions were estimated using a model derived from a mass balance on the tank and the obtained temperature profile. Only 3 of 8 scenarios had pressure increases large enough to cause venting of VOC. C2-C5 compounds constituted the majority of VOCs released from crude oils and ethanol made up the majority of the VOCs released from the gasoline carrying barge. The calculated daily emission factors for crude oil and gasoline (barge) were 10 mg/L/day and 135 mg/L/day respectively

    RFID Technology Enhancing Supply Chain Competence and E-Business: An Opportunity or a Threat?

    Get PDF
    Radio Frequency Identification (RFID), which uses radio waves to identify objects, was discovered in 1930s for military purposes and it transformed into commercial uses in 1980s in the United States. In this paper, we explore the research domains in RFID technology, innovation and diffusion theory, and supply chain management within the existing literature for exploring whether RFID enhances supply chain competence and ebusiness. This paper also forms a preliminary study base for researchers who may wish to carry on future research in this area

    An authentication framework for Wireless Sensor Networks using identity-based signatures

    Get PDF
    In Wireless Sensor Networks (WSNs), authentication is a crucial security requirement to avoid attacks against secure communication, and to mitigate DoS attacks exploiting the limited resources of sensor nodes. Resource constraints of sensor nodes are hurdles in applying strong public key cryptographic based mechanisms in WSNs. To address the problem of authentication in WSNs, we propose an efficient and secure framework for authenticated broadcast/multicast by sensor nodes as well as for outside user authentication, which utilizes identity based cryptography and online/offline signature schemes. The primary goals of this framework are to enable all sensor nodes in the network, firstly, to broadcast and/or multicast an authenticated message quickly; secondly, to verify the broadcast/multicast message sender and the message contents; and finally, to verify the legitimacy of an outside user. The proposed framework is also evaluated using the most efficient and secure identity-based signature schemes

    Further discussions on the security of a nominative signature scheme

    Get PDF
    A nominative signature scheme allows a nominator (or signer) and a nominee (or veri¯er) to jointly generate and publish a signature in such a way that only the nominee can verify the signature and if nec- essary, only the nominee can prove to a third party that the signature is valid. In a recent work, Huang and Wang proposed a new nominative signature scheme which, in addition to the above properties, only allows the nominee to convert a nominative signature to a publicly veri¯able one. In ACISP 2005, Susilo and Mu presented several algorithms and claimed that these algorithms can be used by the nominator to verify the validity of a published nominative signature, show to a third party that the signature is valid, and also convert the signature to a publicly veri¯able one, all without any help from the nominee. In this paper, we point out that Susilo and Mu\u27s attacks are actually incomplete and in- accurate. In particular, we show that there exists no e±cient algorithm for a nominator to check the validity of a signature if this signature is generated by the nominator and the nominee honestly and the Decisional Di±e-Hellman Problem is hard. On the other hand, we point out that the Huang-Wang scheme is indeed insecure, since there is an attack that allows the nominator to generate valid nominative signatures alone and prove the validity of such signatures to a third party

    An attribute-based framework for secure communications in vehicular ad hoc networks

    Get PDF
    In this paper, we introduce an attribute-based framework to achieve secure communications in vehicular ad hoc networks (VANETs), which enjoys several advantageous features. The proposed framework employs attribute-based signature (ABS) to achieve message authentication and integrity and protect vehicle privacy, which greatly mitigates the overhead caused by pseudonym/private key change or update in the existing solutions for VANETs based on symmetric key, asymmetric key, and identity-based cryptography and group signature. In addition, we extend a standard ABS scheme with traceability and revocation mechanisms and seamlessly integrate them into the proposed framework to support vehicle traceability and revocation by a trusted authority, and thus, the resulting scheme for vehicular communications does not suffer from the anonymity misuse issue, which has been a challenge for anonymous credential-based vehicular protocols. Finally, we implement the proposed ABS scheme using a rapid prototyping tool called Charm to evaluate its performance
    corecore